A technique for hiding of data, including watermarks, in human-perceptible images, that is, image host data, is disclosed. In one embodiment a method comprises three steps. In the first step, data to be embedded is inputted. In the case of a watermark, this data is a unique signature, and may be a pseudo-noise (PN) code. In the case of hidden data to be embedded in the host data, this data is the hidden data itself, or the hidden data as spread against the frequency spectrum by a pseudo-noise (PN) code. In the second step, the inputted data is embedded within the host data, in accordance with a perceptual mask of the host data. The perceptual mask determines the optimal locations within the host data to insert the inputted data. In the case of images, these optimal locations are determined by reference to the human visual system. In the third step, the host data, with the embedded data, is further masked by a non-frequency mask. In the case of image data, the non-frequency mask is a spatial mask.
|
1. A computerized method for embedding inputdata into host data representing a human-perceptible image comprising:
inputting the input data; embedding the input data into the host data in accordance with a perceptual mask conducted in the frequency domain; and, further wherein the input data is embedded in the host data in accordance with a perceptual mask in a domain other than the frequency domain.
8. A computerized system for hiding input data having a plurality of bits within a host data representing a human-perceptible image comprising:
a processor; a computer-readable medium; computer-executable instructions executed by the processor from the computer-readable medium comprising; segmenting the host data into a plurality of blocks; applying a discrete cosine transform (dct) to each block of the host data to generate a frequency block corresponding to the block of host data; applying a perceptual mask to each frequency block; embedding each bit of the input data into a corresponding frequency block; and, applying and inverse dct to each frequency block to generate the host data having the put data embedded therein. 11. A computer-readable medium having a computer program stored thereon to cause a suitably equipped computer to perform the method comprising:
segmenting host data representing a human-perceptible image into a plurality of blocks; spreading each of a plurality of bits of input data by a signature after selecting a plurality of blocks of the host data; applying a discrete cosine transform (dct) to each block of the host data to generate a frequency block corresponding to the block of host data; applying a perceptual mask to each frequency block; embedding each bit of the input data, as spread by the signature, into a corresponding frequency block; applying an inverse dct to each frequency block to generate the host data having the input data embedded therein; and, applying a spatial mask to the host data having the input data embedded therein.
14. A computer-readable medium having a computer program stored thereon to cause a suitably equipped computer to perform the method comprising:
segmenting host data representing a human-perceptible image into a plurality of blocks; applying a discrete cosine transform (dct) to each block of the host data to generate a frequency block corresponding to the block of host data; applying a preceptual mask to each frequency block; applying the dct to each bit of a plurality of bits of a watermark; scaling the each frequency, as to which the perceptual mask has been applied, by a corresponding bit of the watermark, as to which the dct has been applied, and by a spatially masked block corresponding to the frequency block, to generate an adder block corresponding to the frequency block; adding each frequency bock with the adder block corresponding to the frequency block; applying an inverse dct to each frequency block as has been added to with the adder block corresponding to the frequency block to generate a watermarked block of the host data corresponding to the frequency block; and, applying a spatial mask to each watermarked block to generate the spatially masked block corresponding to the frequency block to which the watermarked block corresponds; embedding each bit of the input data into a corresponding frequency block; and applying an inverse dct to each frequency block to generate the host data having the input data embedded therein.
13. A computerized system for embedding a watermark into a host data representing a human-perceptible image comprising:
a processor; a computer-readable medium; computer-executable instructions executed by the processor for the computer-readable medium comprising: segmenting the host data into a plurality of blocks; applying a discrete cosine transform (dct) to each block of the host data to generate a frequency block corresponding to the block of host data; applying a perceptual mask to each frequency block; applying the dct to each bit of a plurality of bits of the watermark; scaling each frequency block, as to which the perceptual mask has been applied, by a corresponding bit of the watermark, as to which the dct has been applied, and by a spatially masked block corresponding to the frequency block, to generate an adder block corresponding to the frequency block; adding each frequency block with the adder block corresponding to the frequency block; applying an inverse dct to each frequency block as has been added to with the adder block corresponding to the frequency block to generate a watermarked block of the host data corresponding to the frequency block; and, applying a spatial mask to each watermarked block to generate the spatially masked block corresponding to the frequency block to which the watermarked block corresponds; embedding each bit of the input data into a corresponding frequency block; and, applying an inverse dct to each frequency block to generate the host data having the input data embedded therein. 2. The computerized method of
3. The computerized method of
4. The computerized method of
5. The computerized method of
6. The computerized method of
c(f,fm)=co (f)·Max{1,[f(f/fm)cm ].alpha.}
, where co (f) is a detection threshold at the frequency f. 9. The computerized system of
10. The computerized system of
15. The computer-readable medium of
16. The method according to
17. The method according to
18. The method according to
19. The method according to
20. The method according to
21. The method according to
22. The method according to
23. The method according to
|
The present invention was made with government support by AFOSR under grant AF/F49620-94-1-0461 ARPA grant AF/F49620-93-1-0558 and NSF grant INT-9406954. The Government has certain rights in this invention.
This application claims the benefit of U.S. Provisional Application No. 60/024,979, filed Aug. 30, 1996, which is hereby incorporated by reference. U.S. Provisional Application No. 60/050,587, filed Jun. 24, 1997, the benefit of which is also claimed, is also hereby incorporated by reference. Co-filed applications entitled "Method and Apparatus for Embedding Data, Including Watermarks, in Human Perceptible Sounds," application Ser. No. 08/918,891 Aug. 27, 1997 "Method and Apparatus for Video Watermarking," application Ser. No. 08/918,125 Aug. 27, 1997 and "Method and Apparatus for Scene-Based Video Watermarking," application ser. No. 08/921,931 Aug. 27, 1997 and "Digital Watermarking to Resolve Multiple claims of Ownership" application Ser. No. 08/918,126 Aug. 27, 1997 are also hereby incorporated by reference.
This invention relates generally to techniques for embedding data such as watermarks, signatures and captions in digital data, and more particularly to embedding such data in human perceptible images.
Advances in information systems and networked databases continue to spur rapid growth in digital media, e.g., audio, image and video. This is due, in part, to highly efficient manipulation, reproduction, and access afforded by digital media. Data hiding is the process of encoding extra information in digital data, such as video, images or sounds, by making small modifications to the data. Hiding information in images may be used to supplement an image or sound with additional information, or verify the integrity of the image or sound. The hidden information itself may be text, audio or image data or hyperlinks. For example, text captions may be used to label faces and buildings in an image. A short audio clip may associate a train whistle with an image of a locomotive. A hyperlink may join an image region to another document or data source.
The embedded data typically remains with the image when it is stored or transmitted. The embedded data may be meant to be extracted by an end user, or hidden to the end user. In the former instance, for example, a consumer may extract the embedded data and use it to satisfy an information need. In the latter instance, the embedded data may be a watermark. Watermarking is a technique used to label digital media by hiding copyright or other information into the underlying data. Unlike encryption, for example, which is used to restrict access to data, watermarking is employed to provide solid proof of authorship. Like data hiding generally, the watermark remains with the media. However, unlike data hiding generally, with watermarking the user cannot access the embedded information (i.e., the watermark).
Data hiding in general, and watermarking in particular, typically must satisfy the following requirements to be useful: they must be invisible, and they must be robust. Although other criteria may be important (such as statistical invisibility, the support for multiple data embeddings and self-clocking), the invisibility and the robustness of the resulting data are most important. The first requirement is that the hidden data remain invisible in the case where the host data is image data.
Otherwise, the quality of the image may degrade.
The second requirement, robustness, relates to the survivability of the hidden data in light of the manipulation of the media in which it is embedded. Typically, image data is subject to signal processing operations such as filtering, resampling, compression, noise, cropping, audio-to-digital and subsequent digital-to-audio conversion, etc. For example, a small section of an image may be cropped so only that section is used. An image may also be compressed by a technique such as JPEG so that its transmission is completed in a shorter period of time. Because the host data will invariably be subject to such manipulation, the embedded data must be robust. That is, the embedded data must able to survive after the host data has been subjected to signal processing operations.
Several data hiding techniques are found in the prior art. The most common approaches modify the least significant bits (LSB) of an image based on the assumption that the LSB data are insignificant. In one particular technique, the LSB of data is replaced with a pseudo-noise (PN) sequence, while in another technique, a PN sequence is added to the LSB of the data. A data hiding method called "Patchwork" for image data chooses n pairs (ai, bi) of points within an image and increase the brightness of ai by one unit while simultaneously decreasing the brightness of bi. However, any approach which only modifies the LSB data is highly sensitive to noise and is easily destroyed. Furthermore, image quality may be degraded by the hidden data.
Thus, there is a need for a data hiding and watermarking technique that is invisible in the case of image data and has the maximum robustness to ensure that the embedded data survives both legitimate and illegitimate data manipulation.
The present invention provides for the hiding of data, including watermarks, in human-perceptible images, that is, image host data. The present invention employs perceptual masking models to determine the optimal locations within host data to insert the hidden data or watermark. In one embodiment of the invention, a method comprises three steps. In the first step, data to be embedded is inputted. In the case of a watermark, this data is a unique signature, and may be a pseudo-noise (PN) code generated by the invention. In the case of hidden data to be embedded in the host data, this data is the hidden data itself, or the hidden data as spread against the frequency spectrum by a pseudo-noise (PN) code.
In the second step, the inputted data is embedded within the host data, in accordance with a perceptual mask of the host data. The perceptual mask determines the optimal locations within the host data to insert the inputted data. In the case of images, these optimal locations are determined by reference to the human visual system. Any model mimicking the human visual system can be used under the present invention.
Finally, in the third step, the host data, with the embedded data, is further masked by a non-frequency mask, to ensure that the embedded data is indeed invisible within the host data. In the case of image data, the non-frequency mask is a spatial mask. Still other and further aspects, advantages and embodiments of the present invention will become apparent in the following description and by reference to the accompanying drawings .
FIG. 1 is a flow chart of a method according to the present invention;
FIG. 2 is a diagram of a typical computer to be used with the present invention;
FIG. 3 is a flow chart of a method effectuating data hiding within an image using perceptual frequency masking and spatial masking according to the present invention; and,
FIG. 4 is a flow chart of a method effectuating watermark generation for image data according to the present invention.
GENERAL OVERVIEW OF THE PRESENT INVENTION
The present invention provides for the hiding of data, including watermarks, in human perceptible images. That is, the present invention provides for the hiding of data within host data, or watermarking host data. The host data is image data. Referring to FIG. 1, a method according to one embodiment of the invention is shown. In step 10, data is inputted. In the case of watermarking, this data is a signature, or watermark, that acts as a unique identifier for the host data, and which may be generated by the invention. In the case of embedding input data within the host data, this data is either the input data itself, or the input data as spread against a signature according to spread-spectrum techniques that are well known in the art. Spreading the signal provides for robustness of data. Without spreading the signal, the hidden data amasses towards the low end of the frequency spectrum; a filter applied to the entire data set that removes low frequencies may also remove the hidden data. Spreading the signal spreads the data over the entire frequency range. Note that in the case of watermarking the host data, the signature inherently is spread across the frequency spectrum without explicit spread-spectrum processing.
In one embodiment of the invention, the signature is a pseudo-noise (PN) sequence. These are used as codewords for the watermarks because of their noise-like characteristics, resistance to interference, and their good auto-correlation properties. PN-sequences are periodic noise-like binary sequences generated by length m linear shift registers. The maximum period of a PN-sequence is 2m -1. When the period is exactly 2m -1, the PN-sequence is called an m-sequence. In one embodiment, m-sequences are used to provide an easy way to generate a unique code for an author's identification. Furthermore, the period N autocorrelation function has peaks equal to 1 at 0, N, 2N, etc., and is approximately equal to 1/N, elsewhere. Because of these periodic peaks, an m-sequence is self-clocking. This allows synchronization with the embedded watermark during the detection process. It is also important if the signal is cropped and re-sampled.
In step 12, the data inputted in step 10 is embedded within the host data as dictated by a perceptual mask. A perceptual masking model is used to determine the optimal locations within the host data in which to insert the hidden data or watermark. The perceptual mask is specific to the host data being image data. The mask provides for the data inputted by step 10 to be embedded with the host data, at places typically imperceptible to the human eye. That is, the perceptual mask exploits masking properties of the human visual system. The perceptual masking of step 12 is conducted in the frequency domain.
Perceptual visual masking refers to a situation where a signal raises the visual threshold for other signals around it. The visual masking model is based on a frequency domain masking data in which a masking grating raises the visual threshold for signal gratings around the masking frequency. In one embodiment, the model used expresses the contrast threshold at frequency f as a function of f, the masking frequency fm and the masking contrast cm :
c(f,fm)=co (f)·Max{1,[f(f/fm)cm ].alpha. },
where co (f) is the detection threshold at frequency f. To find the contrast threshold c(f) at a frequency f in an image, a discrete cosine transform (DCT) is used to transform the image into the frequency domain and find the contrast at each frequency. Then, a summation rule of the for m
c(f)=[Σfm c(f,fm)]1/β,
is used. If the contrast error at f is less than c(f), the model predicts that the error is invisible to human eyes.
In step 14, the host data, including the embedded input data or watermark, is further subject to a non-frequency mask. Because the perceptual mask in step 12 is a frequency domain mask, a further mask is necessary to ensure that the embedded data remains invisible in image host data. In the case of image host data, the non-frequency mask is a spatial mask.
With respect to image data, frequency masking effects are localized in the frequency domain, while spatial masking effects are localized in the spatial domain. Spatial masking refers to the situation that an edge raises the perceptual threshold around it. Any model for spatial masking can be used, and such models are well known in the art. However, the model used in one embodiment of the invention is similar to the model disclosed in "Low Bit Rate Near-Transparent Image Coding," in Proceedings of the SPIE International Conference on Wavelet Applications for Dual Use, vol. 2491, (Orlando, Fla), pp. 173-184 (1995), which is herein incorporated by reference, and which is based on a model proposed by Girod in "The Information Theoretical Significance of Spatial and Temporal Masking in Video Signals," in Proceedings of the SPIE Human Vision, Visual Processing, and Digital Display, vol. 1077, pp. 178-187 (1989), which is also herein incorporated by reference. In one embodiment, the upper channel of Girod's model is linearized under the assumption of small perceptual errors, the model giving the tolerable error level for each pixel in the image, as those skilled in the art can appreciate.
As have been described, steps 10, 12 and 14 of FIG. 1 provide a general overview of the present invention. Because, however, the invention varies particularly as to whether input data is being embedded into the host data, or whether a watermark is being embedded into the host data, the specifics of the implementation of the invention as to watermarking and hidden data embedding are now provided.
HARDWARE IMPLEMENTATION OF THE INVENTION
The present invention is not limited as to the type of computer on which it runs. However, a typical example of such a computer is shown in FIG. 2. Computer 16 is a desktop computer, and may be of any type, including a PC-compatible computer, an Apple Macintosh computer, a UNIX-compatible computer, etc. Computer 16 usually includes keyboard 18, display device 20 and pointing device 22. Display device 20 can be any of a number of different devices, including a cathode-ray tube (CRT), etc. Pointing device 22 as shown in FIG. 2 is a mouse, but the invention is not so limited. Not shown is that computer 16 typically also comprises a random-access memory (RAM), a read-only memory (ROM), a central-processing unit (CPU), a fixed storage device such as a hard disk drive, and a removable storage device such as a floppy disk drive. The computer program to implement the present invention is typically written in a language such as C, although the present invention is not so limited.
DATA HIDING WITHIN AN IMAGE HOST DATA
The embodiment shown in FIG. 3 illustrates the data hiding aspect of the present invention as it relates to host data that is an image. Referring now to FIG. 3, a block diagram of one embodiment of the invention, in which hidden data is embedded into an image by using a perceptual mask, is shown. As shown in the diagram, blocks Bi of the image data (host data) are selected to embed the data bi which are first spread by signature si. The set of all data b is hidden one bit at a time in particular block B of the image data. The notation bi refers to the I bit of hidden data b, while the notation Bi refers to the I block of host data B. Similarly, the notation Si refers to the I bit of signature S.
In step 24, data bi is spread by signature Si. Data bi can be any type of data: caption information regarding the image; sound data regarding the image; etc. Signature Si can by any type of signature--for example, a pseudo-noise (PN) code as has been already described. Note that step 24 is not required under the present invention. Data b does not have to be spread in order for the invention to function correctly; without spreading against a signature S, those skilled in the art will understand that there is then an implicit "spreading" against a signature S having all 1 bits. However, spreading of the data B is preferable for robustness. In step 26, a discrete cosine transform (DCT) is applied to each block Bi to form a DCT block Fi. That is, Fi is the frequency domain equivalent of block Bi. Transforming the host data into the frequency domain is necessary in order to properly apply the perceptual mask according to the present invention.
In step 28, the perceptual mask is applied to each block Fi to generate a masked block Mi corresponding to Fi. The perceptual mask according to the present invention takes into account the human visual system so that the input data is embedded within the host data in a manner that makes the hidden data invisible within the host data. The invention is not limited to any particular perceptual mask; however, as has already been described in conjunction with the general overview of the invention, a particular perceptual mask for image data has been used. In the case (as is here) where the host data is image data, the perceptual model used is the model for image data, and reference to the discussion provided earlier should be made in order for further understanding thereto.
In step 30, a bit bi is hidden in block Fi by modifying the DCT coefficients according the equation
Fi '(j,k)=([Fi (j,k)/Mi (j,k)]+(1/4)bi Si (j,k))Mi (j,k),
where [·] denotes the rounding operation. In step 32, the original image blocks Bi are replaced by the inverse DCT's of the modified blocks Fi '. Finally, in step 34, spatial masking is applied to the data. The invention is not limited to any particular spatial mask. One particular spatial mask for host data that is an image has already been described in conjunction with the general overview of the invention, and reference should be made to that discussion for further understanding thereto. Spatial masking ensures that the embedded data is indeed hidden (i.e., invisible) within the host data as examined by the human eye.
As has been described, the method shown in FIG. 3 provides for data embedding within an image according to a perceptual visual mask and a spatial mask. The method of FIG. 3 also provides for robust data embedding. Spreading the hidden data in step 24 ensures that a filter cutting off the low frequencies of the data will not corrupt the data. Furthermore, the method provides for invisible data embedding, in that the mask of step 28 is perceptual such that the data is then embedded in step 30 in places within the image which are imperceptible to the human eye. The spatial mask in step 34 complements the perceptual mask, and further ensures that the hidden data is invisible.
To add further robustness to the hidden data, the data hiding techniques may be modified to take into account certain signal processing operations. For example, if it is known that a JPEG coder will be applied to the image, the data hiding procedures can be modified appropriately. That is, the mask Mi of step 28 may be preprocessed using the JPEG quantization table by substituting a new mask Mi =Q * Mi for Mi, where Q is the estimated quality factor for the JPEG coder. This will help ensure that if the data is subjected to JPEG compression, the hidden data will remain embedded within the host data.
Those skilled in the art will recognize that the method shown in FIG. 3 is largely reversible such that extraction of the embedded data from an image having embedded data is possible. Given an image with (possibly modified) hidden data blocks Fi ", the data bit bi may be recovered by forming the difference ##EQU1## where Mi ' is the frequency mask estimated by the receiver times the signature Si, i.e.,Mi '=Miest * Si, and sgn(·) is the sign value. The bit decision for block Bi is weighted by the mask Mi '. The bit error rate (BER) of this scheme is zero when no distortion is present in the received image. A simple expression for the upper bound of the BER when zero mean Gaussian noise with variance σ2 is added to the signal can be derived. Without loss of generality, assume that bi =1. A decision error occurs for coefficient F"(j,k) whenever the magnitude of a noise sample |w(j,k)| falls in one of the intervals ##EQU2## for n=0, 1, 2, . . . . Using the complementary error function er fc(·), the probability of error for coefficient F"(j,k) may be written as ##EQU3## For σ fixed, Pe (F"(j,k),σ) decreases as M(j,k) increases. Therefore, the receiver places more weight on coefficients with large masking values. The overall probability of error for bit bi is a weighted combination of the Pe (F"(j,k),σ) in block Bi.
WATERMARK GENERATION FOR IMAGE HOST DATA
The embodiment shown in FIG. 4 illustrate the watermark generation aspect of the present invention as it relates to host data that is an image. Referring now to FIG. 4, a block diagram of one embodiment of the invention, in which a watermark is embedded into an image by using a perceptual mask, is shown. In step 36, the image data is segmented into blocks. Using a traditional approach, the blocks may be n×n (e.g., 8×8 like JPEG). An option at this stage is to segment the image into blocks of objects and texture regions, as opposed to square blocks of data. In either case, blocking the image adds detection robustness to cropping and localized signal processing operations. In step 38, a discrete cosine transform (DCT) is applied to each block. This transform the data into the frequency domain, where perceptual masking is conducted.
A perceptual frequency mask is then computed for each block in step 40. The perceptual mask according to the present invention takes into account the human visual system so that the watermark is embedded within the host data in a manner that makes the watermark invisible within the host data. The invention is not limited to any particular perceptual mask; however, as has already been described in conjunction with the general overview of the invention, a particular perceptual mask for image data has been used. In the case (as is here) where the host data is image data, the perceptual model used is the model for image data, and reference to the discussion provided earlier should be made in order for further understanding thereto.
In step 42, the unique signature, or watermark, is also transformed into the frequency domain by DCT. The signature can be of any type, such as a pseudo-noise (PN) code, as has already been described. In particular, the signature may be a type of PN code known as an m-sequence, as has also already been described. Note that a different signature sequence is used for each image block. In step 44, the resulting mask of step 40 is multiplied with the DCT of the signature resulting from step 42. In addition, the mask of step 40 is also scaled by the spatial mask of step 50, as will be described. In step 46, the watermarked and scaled mask resulting from step 44 is added to the corresponding DCT block resulting from step 38. The watermarked image is then obtained by assembling the inverse DCT's of each block in step 48.
This watermarked imaged is spatially masked in step 50 to scale the mask multiplied by the DCT of the signature in step 44. The spatial model is used to verify that the watermark designed with the frequency masking model is invisible for local spatial regions. The invention is not limited to any particular spatial mask. One particular spatial mask for host data that is an image has already been described in conjunction with the general overview of the invention, and reference should be made to that discussion for further understanding thereto. In this model, each watermark coefficient is compared with the tolerable error level obtained to assure that it is invisible. A visible watermark is rescaled via a weighting factor.
As has been described, the method shown in FIG. 4 provides for watermarking an image according to a perceptual visual mask and a spatial mask. The method of FIG. 4 also provides for robust watermarking. Furthermore, the method provides for invisible watermarking, in that the mask of step 40 is perceptual such that the watermark is embedded in step 44 in places within the image which are imperceptible to the human eye. The spatial mask in step 50 complements the perceptual mask, and further ensures that the input data is invisible.
The watermark embedded within the image data according to the method of FIG. 4 should be extractable even if common signal processing operations are applied to the host image. This is particularly true in the case of deliberate unauthorized attempts to remove the watermark. For example, a pirate may attempt to add noise, filter, code, re-scale, etc., an image in an attempt to destroy the watermark. The embedded watermark, however, is noise-like and its location over multiplied blocks of the data is unknown. Therefore, the pirate has insufficient knowledge to directly remove the watermark. Furthermore, a different signature is used for each block to further reduce unauthorized watermark removal by cross-correlation. Therefore, any destruction attempts are done blindly.
To detect whether a watermark is within a host image data, the author of the image has access of the original signal S (that is, the original host data), and the signature. Detection of the watermark is accomplished via hypothesis testing:
H0 :X=R-S=N (No watermark)
H1 :X=R-S=W'+N (Watermark)
where R is the potentially pirated signal, W' is the potentially modified watermark, and N is noise. The correct hypothesis is obtained by applying a correlating detector on X with W and comparing with a threshold. In some cases, e.g., spatial resealing, a generalized likelihood ratio test must be applied.
Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement which is calculated to achieve the same purpose may be substituted for the specific embodiments shown. This application is intended to cover any adaptations or variations of the present invention. Therefore, it is manifestly intended that this invention be limited only by the following claims and equivalents thereof.
Zhu, Bin, Tewfik, Ahmed H., Swanson, Mitchell D.
Patent | Priority | Assignee | Title |
10026410, | Oct 15 2012 | Digimarc Corporation | Multi-mode audio recognition and auxiliary data encoding and decoding |
10078878, | Oct 21 2012 | Digimarc Corporation | Methods and arrangements for identifying objects |
10140945, | May 04 2005 | SAMSUNG ELECTRONICS CO , LTD | Luminance suppression power conservation |
10163137, | Feb 05 2003 | HOFFBERG FAMILY TRUST 2 | System and method for incentivizing participation in a market transaction |
10361802, | Feb 01 1999 | Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 | Adaptive pattern recognition based control system and method |
10438310, | Dec 23 2008 | Digimarc Corporation | Signal decoding methods, apparatus and systems |
10491379, | May 08 2012 | ARM Limited | System, device, and method of secure entry and handling of passwords |
10546590, | Oct 15 2012 | Digimarc Corporation | Multi-mode audio recognition and auxiliary data encoding and decoding |
10567975, | Oct 04 2005 | HOFFBERG FAMILY TRUST 2 | Multifactorial optimization system and method |
10607311, | Sep 17 2004 | Digimarc Corporation | Hierarchical watermark detector |
10685620, | May 04 2005 | Samsung Electronics Co., Ltd. | Luminance suppression power conservation |
10902544, | Oct 21 2012 | Digimarc Corporation | Methods and arrangements for identifying objects |
10943030, | Dec 15 2008 | GUYMON, JOHN LEWIS, JR | Securable independent electronic document |
10943273, | Feb 05 2003 | HOFFBERG FAMILY TRUST 2 | System and method for determining contingent relevance |
11010452, | Nov 04 2012 | MINING IP LIMITED | Content protection |
11068679, | Aug 30 2011 | Digimarc Corporation | Methods and arrangements for identifying objects |
11132674, | Mar 04 2015 | Micro trusted network | |
11145270, | May 04 2005 | Samsung Electronics Co., Ltd. | Luminance suppression power conservation |
11183198, | Oct 15 2012 | Digimarc Corporation | Multi-mode audio recognition and auxiliary data encoding and decoding |
11625551, | Aug 30 2011 | Digimarc Corporation | Methods and arrangements for identifying objects |
11790413, | Feb 05 2003 | HOFFBERG FAMILY TRUST 2 | System and method for communication |
11990143, | Oct 15 2012 | Digimarc Corporation | Multi-mode audio recognition and auxiliary data encoding and decoding |
6229924, | Nov 12 1996 | DIGIMARC CORPORATION AN OREGON CORPORATION | Method and apparatus for watermarking video images |
6233347, | May 21 1998 | Massachusetts Institute of Technology | System method, and product for information embedding using an ensemble of non-intersecting embedding generators |
6246775, | Sep 17 1997 | Pioneer Electronic Corporation | Method and appartus for superposing a digital watermark and method and apparatus for detecting a digital watermark |
6259801, | Jan 21 1999 | NEC PERSONAL COMPUTERS, LTD | Method for inserting and detecting electronic watermark data into a digital image and a device for the same |
6282299, | Aug 30 1996 | DIGIMARC CORPORATION AN OREGON CORPORATION | Method and apparatus for video watermarking using perceptual masks |
6320965, | Oct 14 1998 | Microsoft Technology Licensing, LLC | Secure watermark method and apparatus for digital signals |
6359998, | Apr 23 1998 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method and apparatus for wavelet-based digital watermarking |
6389152, | Sep 17 1997 | Pioneer Electronic Corporation | Method and apparatus for superposing a digital watermark and method and apparatus for detecting a digital watermark |
6404926, | Sep 02 1997 | Sony Corporation | Apparatus and method of processing image data, transmission medium, and recording medium |
6442283, | Jan 11 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Multimedia data embedding |
6553070, | Feb 24 1997 | NEC PERSONAL COMPUTERS, LTD | Video-data encoder and recording media wherein a video-data encode program is recorded |
6553129, | Jul 27 1995 | DIGIMARC CORPORATION AN OREGON CORPORATION | Computer system linked by using information in data objects |
6611607, | May 08 1995 | DIGIMARC CORPORATION AN OREGON CORPORATION | Integrating digital watermarks in multimedia content |
6611608, | Oct 18 2000 | Matsushita Electric Industrial Co., Ltd. | Human visual model for data hiding |
6614914, | May 16 1996 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermark embedder and reader |
6631198, | Jun 19 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Perceptual modeling of media signals based on local contrast and directional edges |
6636638, | Nov 18 1998 | Kabushiki Kaisha Toshiba | Equipment control method and equipment control system |
6647128, | Nov 18 1993 | DIGIMARC CORPORATION AN OREGON CORPORATION | Method for monitoring internet dissemination of image, video, and/or audio files |
6664976, | Apr 18 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Image management system and methods using digital watermarks |
6681029, | Nov 18 1993 | DIGIMARC CORPORATION AN OREGON CORPORATION | Decoding steganographic messages embedded in media signals |
6718047, | May 08 1995 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermark embedder and reader |
6721362, | Mar 30 2001 | REDROCK SEMICONDUCTOR, LTD | Constrained discrete-cosine-transform coefficients for better error detection in a corrupted MPEG-4 bitstreams |
6748362, | Sep 03 1999 | Time Warner Cable Enterprises LLC | Process, system, and apparatus for embedding data in compressed audio, image video and other media files and the like |
6751337, | Jan 11 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermark detecting with weighting functions |
6768809, | Feb 14 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermark screening and detection strategies |
6771796, | Oct 21 1994 | DIGIMARC CORPORATION AN OREGON CORPORATION | Methods for identifying equipment used in counterfeiting |
6775392, | Jul 27 1995 | DIGIMARC CORPORATION AN OREGON CORPORATION | Computer system linked by using information in data objects |
6778587, | Sep 01 2000 | Microsoft Technology Licensing, LLC | Spread spectrum modulation system and method for embedding digital information into digital or analog media |
6798894, | Aug 26 1997 | DIGIMARC CORPORATION AN OREGON CORPORATION | Method and apparatus for watermarking video images |
6809792, | Oct 09 2000 | Monument Peak Ventures, LLC | Spectral watermarking for motion picture image data |
6922777, | Mar 31 1999 | Canon Kabushiki Kaisha | Apparatus, computer medium, and method for embedding and extracting a first and second data into a watermark |
6940993, | Dec 13 2000 | Monument Peak Ventures, LLC | System and method for embedding a watermark signal that contains message data in a digital image |
6950519, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Geographically watermarked imagery and methods |
6973197, | Nov 05 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermarking with separate application of the grid and payload signals |
6975746, | Nov 18 1993 | DIGIMARC CORPORATION AN OREGON CORPORATION | Integrating digital watermarks in multimedia content |
6988202, | May 08 1995 | DIGIMARC CORPORATION AN OREGON CORPORATION | Pre-filteriing to increase watermark signal-to-noise ratio |
6993148, | Jul 16 1999 | Canon Kabushiki Kaisha | Image processing apparatus and method, and storage medium |
6993152, | Mar 17 1994 | DIGIMARC CORPORATION AN OREGON CORPORATION | Hiding geo-location data through arrangement of objects |
7009494, | Nov 21 2003 | CARESTREAM HEALTH, INC | Media holder having communication capabilities |
7013021, | Mar 19 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermark detection utilizing regions with higher probability of success |
7020285, | Jul 13 1999 | Microsoft Technology Licensing, LLC | Stealthy audio watermarking |
7020303, | Mar 18 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Feature-based watermarks and watermark detection strategies |
7042470, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Using embedded steganographic identifiers in segmented areas of geographic images and characteristics corresponding to imagery data derived from aerial platforms |
7043019, | Feb 28 2001 | Eastman Kodak Company | Copy protection for digital motion picture image data |
7061510, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Geo-referencing of aerial imagery using embedded image identifiers and cross-referenced data sets |
7068809, | Aug 27 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Segmentation in digital watermarking |
7076082, | Mar 22 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Media signal filtering for use in digital watermark reading |
7088844, | Jun 19 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Perceptual modeling of media signals based on local contrast and directional edges |
7098931, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Image management system and methods using digital watermarks |
7099473, | Jan 21 2000 | Canon Kabushiki Kaisha | Information processing apparatus and method |
7099492, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Method of steganographically embedding geo-location data in media |
7109986, | Nov 19 2003 | CARESTREAM HEALTH, INC | Illumination apparatus |
7111168, | May 01 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarking systems |
7116781, | Nov 18 1993 | DIGIMARC CORPORATION AN OREGON CORPORATION | Counteracting geometric distortions in watermarking |
7139408, | Aug 26 1997 | DIGIMARC CORPORATION AN OREGON CORPORATION | Transform domain watermarking of image signals |
7145464, | Nov 19 2003 | CARESTREAM HEALTH, INC | Data collection device |
7154560, | Oct 27 1997 | Watermarking of digital image data | |
7181017, | Mar 23 2001 | RPX Corporation | System and method for secure three-party communications |
7184572, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Using steganographic encoded information with maps |
7197160, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Geographic information systems using digital watermarks |
7197368, | May 22 1999 | Microsoft Technology Licensing, LLC | Audio watermarking with dual watermarks |
7200231, | Mar 31 1999 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, and computer-readable recording medium |
7206649, | Jul 15 2003 | Microsoft Technology Licensing, LLC | Audio watermarking with dual watermarks |
7206820, | Mar 18 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | System for linking from object to remote resource |
7221759, | Mar 27 2003 | Eastman Kodak Company | Projector with enhanced security camcorder defeat |
7231061, | Jan 22 2002 | DIGIMARC CORPORATION AN OREGON CORPORATION | Adaptive prediction filtering for digital watermarking |
7249257, | Apr 10 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digitally watermarked maps and signs and related navigational tools |
7254249, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Embedding location data in video |
7257710, | Aug 21 2001 | Sony Corporation | Additional-data embedding apparatus and additional-data embedding method |
7260722, | Dec 28 2001 | HARRIS GLOBAL COMMUNICATIONS, INC | Digital multimedia watermarking for source identification |
7266697, | Jul 13 1999 | Microsoft Technology Licensing, LLC | Stealthy audio watermarking |
7269734, | Feb 20 1997 | DIGIMARC CORPORATION AN OREGON CORPORATION | Invisible digital watermarks |
7272718, | Oct 29 1999 | Sony Corporation | Device, method and storage medium for superimposing first and second watermarking information on an audio signal based on psychological auditory sense analysis |
7289643, | Dec 21 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Method, apparatus and programs for generating and utilizing content signatures |
7337321, | Apr 05 2002 | Hitachi, Ltd. | Digital content protection using invisible and visible watermarks |
7340076, | May 10 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarks for unmanned vehicle navigation |
7346184, | May 02 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Processing methods combining multiple frames of image data |
7349627, | Sep 12 2003 | Eastman Kodak Company | Tracking an image-recording medium using a watermark and associated memory |
7362336, | Jan 12 2005 | IMAX Corporation | Four color digital cinema system with extended color gamut and copy protection |
7366908, | Aug 30 1996 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarking with content dependent keys and autocorrelation properties for synchronization |
7369678, | May 08 1995 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermark and steganographic decoding |
7376242, | Mar 22 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Quantization-based data embedding in mapped data |
7395211, | Aug 16 2000 | Dolby Laboratories Licensing Corporation | Modulating one or more parameters of an audio or video perceptual coding system in response to supplemental information |
7403708, | Nov 04 2003 | Eastman Kodak Company | Tracking an image-recording medium using an identifying mark and film encodement |
7483547, | Jun 19 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Perceptual modeling of media signals for data hiding |
7502489, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Geographically watermarked imagery and methods |
7502490, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Geographic information systems using digital watermarks |
7502759, | Aug 30 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarking methods and related toy and game applications |
7506169, | Apr 10 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarking maps and signs, and related navigational tools |
7508944, | Jun 02 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Using classification techniques in digital watermarking |
7543148, | Jul 13 1999 | Microsoft Technology Licensing, LLC | Audio watermarking with covert channel and permutations |
7552336, | Jul 13 1999 | Microsoft Technology Licensing, LLC | Watermarking with covert channel and permutations |
7567721, | Jan 22 2002 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarking of low bit rate video |
7574014, | Mar 19 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermark detection utilizing host carrier information |
7577841, | Aug 15 2002 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermark placement in watermarking of time varying media signals |
7580031, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | Histogram and spatial-based power savings |
7583260, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | Color preservation for spatially varying power conservation |
7587368, | Jul 05 2001 | RPX Corporation | Information record infrastructure, system and method |
7602388, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | Edge preservation for spatially varying power conservation |
7629971, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | Methods for spatial-based power savings |
7634134, | Mar 15 2004 | Anti-piracy image display methods and systems | |
7650008, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarking compressed video captured from aerial sensors |
7660429, | Jun 14 2000 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Error diffusion halftone watermarking |
7663597, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | LCD plateau power conservation |
7688996, | Jan 22 2002 | DIGIMARC CORPORATION AN OREGON CORPORATION | Adaptive prediction filtering for digital watermarking |
7697716, | Sep 01 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermarking different areas of digital images with different intensities |
7706565, | Sep 30 2003 | DIGIMARC CORPORATION AN OREGON CORPORATION | Multi-channel digital watermarking |
7714831, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | Background plateau manipulation for display device power conservation |
7720249, | Nov 18 1993 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermark embedder and reader |
7752446, | May 15 2002 | International Business Machines Corporation | System and method for digital watermarking of data repository |
7760210, | May 04 2005 | SAMSUNG ELECTRONICS CO , LTD | White-based power savings |
7760906, | Apr 16 1998 | DIGIMARC CORPORATION AN OREGON CORPORATION | Steganographic encoding |
7769202, | Mar 22 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Quantization-based data embedding in mapped data |
7786988, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | Window information preservation for spatially varying power conservation |
7796978, | Nov 30 2000 | INTRASONICS S A R L | Communication system for receiving and transmitting data using an acoustic data channel |
7822226, | Jun 19 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Perceptual modeling of media signals for data hiding |
7865034, | Mar 15 2004 | Image display methods and systems with sub-frame intensity compensation | |
7886151, | Jan 22 2002 | DIGIMARC CORPORATION AN OREGON CORPORATION | Temporal synchronization of video and audio signals |
7945781, | Nov 18 1993 | DIGIMARC CORPORATION AN OREGON CORPORATION | Method and systems for inserting watermarks in digital signals |
7949147, | Aug 26 1997 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermarking compressed data |
7953824, | Aug 06 1998 | DIGIMARC CORPORATION AN OREGON CORPORATION | Image sensors worn or attached on humans for imagery identification |
7958359, | Apr 30 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Access control systems |
7958365, | Jun 02 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Using classification techniques in digital watermarking |
7970166, | Apr 21 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Steganographic encoding methods and apparatus |
7978875, | Mar 19 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Signal processing utilizing host carrier information |
7987370, | Feb 20 1997 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermark systems and methods |
7992003, | Nov 18 1993 | DIGIMARC CORPORATION AN OREGON CORPORATION | Methods and systems for inserting watermarks in digital signals |
7992004, | Apr 10 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarked imagery, video, maps and signs |
8023691, | Apr 24 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Methods involving maps, imagery, video and steganography |
8023694, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Systems and methods using identifying data derived or extracted from video, audio or images |
8027506, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Geographical encoding imagery and video |
8037311, | Feb 20 1997 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermark systems and methods |
8045749, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Embedding location data in video |
8050450, | Sep 01 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermarking different areas of digital images with different intensities |
8050451, | Apr 03 2003 | Digimarc Corporation | Electronic forms using indicia, sometimes hidden indicia |
8050452, | Mar 22 2002 | Digimarc Corporation | Quantization-based data embedding in mapped data |
8051290, | Dec 21 2001 | Koninklijke Philips Electronics N V | Increasing integrity of watermarks using robust features |
8055013, | Sep 30 2003 | DIGIMARC CORPORATION AN OREGON CORPORATION | Conveying auxilliary data through digital watermarking |
8059860, | Apr 16 1998 | Digimarc Corporation | Steganographic encoding |
8068679, | May 08 1995 | Digimarc Corporation | Audio and video signal processing |
8085976, | Mar 05 2001 | Digimarc Corporation | Digital watermarking video captured from airborne platforms |
8090141, | Jan 31 2006 | Xerox Corporation | System and method to automatically establish preferred area for image-wise watermark |
8098883, | Dec 13 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Watermarking of data invariant to distortion |
8103051, | Jan 11 1999 | DIGIMARC CORPORATION AN OREGON CORPORATION | Multimedia data embedding and decoding |
8103879, | Apr 25 1996 | DIGIMARC CORPORATION AN OREGON CORPORATION | Processing audio or video content with multiple watermark layers |
8106744, | Feb 16 2000 | IP ACQUISITIONS, LLC | Remote control signaling using audio watermarks |
8106745, | Feb 16 2000 | Verance Corporation | Remote control signaling using audio watermarks |
8126272, | May 02 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Methods combining multiple frames of image data |
8127139, | Apr 10 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Handheld devices and methods for extracting data |
8135166, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Embedding geo-location information in media |
8155378, | Feb 14 2000 | Digimarc Corporation | Color image or video processing |
8180844, | Mar 18 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | System for linking from objects to remote resources |
8184851, | Nov 18 1993 | Digimarc Corporation | Inserting watermarks into portions of digital signals |
8185100, | Nov 30 2000 | Intrasonics S.A.R.L. | Communication system |
8203551, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | Televisions with reduced power consumption |
8205086, | Apr 22 2003 | Oki Data Corporation | Watermark information embedding device and method, watermark information detecting device and method, watermarked document |
8207934, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | Spatial based power savings for LCD televisions |
8213674, | Jun 19 2000 | Digimarc Corporation | Perceptual modeling of media signals for data hiding |
8229159, | Sep 28 2007 | Dolby Laboratories Licensing Corporation | Multimedia coding and decoding with additional information capability |
8243980, | Apr 25 1996 | DIGIMARC CORPORATION AN OREGON CORPORATION | Image processing using embedded registration data to determine and compensate for geometric transformation |
8301893, | Aug 13 2003 | DIGIMARC CORPORATION AN OREGON CORPORATION | Detecting media areas likely of hosting watermarks |
8315427, | Jan 22 2002 | Digimarc Corporation | Adaptive prediction filtering for encoding/decoding digital signals in media content |
8316239, | Apr 30 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Decoding information to allow access to computerized systems |
8340348, | Apr 26 2005 | Verance Corporation | Methods and apparatus for thwarting watermark detection circumvention |
8346567, | Jun 24 2008 | Verance Corporation | Efficient and secure forensic marking in compressed domain |
8355526, | Apr 16 1998 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digitally watermarking holograms |
8364673, | Jun 17 2008 | The Trustees of Columbia University in the City of New York | System and method for dynamically and interactively searching media data |
8364966, | Feb 20 1997 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermark systems and methods |
8370869, | Nov 06 1998 | The Trustees of Columbia University in the City of New York | Video description system and method |
8379908, | Aug 06 1998 | DIGIMARC CORPORATION AN OREGON CORPORATION | Embedding and reading codes on objects |
8386912, | Jul 28 1997 | CA, INC | Hypermedia document publishing including hypermedia document parsing |
8391545, | Apr 16 1998 | Digimarc Corporation | Signal processing of audio and video data, including assessment of embedded data |
8447064, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Providing travel-logs based geo-locations relative to a graphical map |
8451086, | Feb 16 2000 | Verance Corporation | Remote control signaling using audio watermarks |
8457208, | Dec 19 2007 | Dolby Laboratories Licensing Corporation | Adaptive motion estimation |
8488682, | Dec 06 2001 | The Trustees of Columbia University in the City of New York | System and method for extracting text captions from video and generating video summaries |
8488900, | Jun 23 2010 | Digimarc Corporation | Identifying and redressing shadows in connection with digital watermarking and fingerprinting |
8509474, | Dec 11 2009 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarking methods, apparatus and systems |
8533481, | Nov 03 2011 | IP ACQUISITIONS, LLC | Extraction of embedded watermarks from a host content based on extrapolation techniques |
8538066, | Apr 26 2005 | Verance Corporation | Asymmetric watermark embedding/extraction |
8549307, | Jul 01 2005 | Verance Corporation | Forensic marking using a common customization function |
8571256, | Sep 28 2007 | Dolby Laboratories Licensing Corporation | Multimedia coding and decoding with additional information capability |
8600830, | Feb 05 2003 | HOFFBERG FAMILY TRUST 2 | System and method for providing a payment to a non-winning auction participant |
8615104, | Nov 03 2011 | Verance Corporation | Watermark extraction based on tentative watermarks |
8615471, | May 02 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Methods and related toy and game applications using encoded information |
8638978, | Jan 22 2002 | DIGIMARC CORPORATION AN OREGON CORPORATION | Digital watermarking of low bit rate video |
8671069, | Dec 22 2008 | The Trustees of Columbia University in the City of New York | Rapid image annotation via brain state decoding and visual pattern mining |
8681978, | Jun 24 2008 | VOBILE INC | Efficient and secure forensic marking in compressed domain |
8682026, | Nov 03 2011 | Verance Corporation | Efficient extraction of embedded watermarks in the presence of host content distortions |
8726304, | Sep 13 2012 | Verance Corporation | Time varying evaluation of multimedia content |
8745403, | Nov 23 2011 | Verance Corporation | Enhanced content management based on watermark extraction records |
8745404, | May 28 1998 | Verance Corporation | Pre-processed information embedding system |
8781967, | Jul 07 2005 | Verance Corporation | Watermarking in an encrypted domain |
8791789, | Feb 16 2000 | Verance Corporation | Remote control signaling using audio watermarks |
8806517, | Oct 15 2002 | IP ACQUISITIONS, LLC | Media monitoring, management and information system |
8811655, | Apr 26 2005 | Verance Corporation | Circumvention of watermark analysis in a host content |
8838977, | Sep 16 2010 | Verance Corporation | Watermark extraction and content screening in a networked environment |
8838978, | Sep 16 2010 | Verance Corporation | Content access management using extracted watermark information |
8849058, | Apr 10 2008 | The Trustees of Columbia University in the City of New York | Systems and methods for image archaeology |
8869222, | Sep 13 2012 | Verance Corporation | Second screen content |
8878041, | May 27 2009 | Microsoft Technology Licensing, LLC | Detecting beat information using a diverse set of correlations |
8891811, | Sep 17 2004 | DIGIMARC CORPORATION AN OREGON CORPORATION | Hierarchical watermark detector |
8904181, | Mar 25 2002 | RPX Corporation | System and method for secure three-party communications |
8912999, | Jul 16 2003 | Samsung Electronics Co., Ltd. | Background plateau manipulation for display device power conservation |
8913780, | Dec 23 2008 | Digimarc Corporation | Digital watermarking methods, apparatus and systems |
8923548, | Nov 03 2011 | Verance Corporation | Extraction of embedded watermarks from a host content using a plurality of tentative watermarks |
8976998, | Apr 24 2001 | Digimarc Corporation | Methods involving maps, imagery, video and steganography |
8983118, | Jun 23 2010 | Digimarc Corporation | Determining proximity of a mobile device to a subject based on shadow analysis |
9009482, | Jul 01 2005 | VOBILE INC | Forensic marking using a common customization function |
9060175, | Mar 04 2005 | The Trustees of Columbia University in the City of New York | System and method for motion estimation and mode decision for low-complexity H.264 decoder |
9106964, | Sep 13 2012 | Verance Corporation | Enhanced content distribution using advertisements |
9117270, | May 28 1998 | Verance Corporation | Pre-processed information embedding system |
9135884, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | LCD plateau power conservation |
9153006, | Apr 26 2005 | Verance Corporation | Circumvention of watermark analysis in a host content |
9189955, | Feb 16 2000 | Verance Corporation | Remote control signaling using audio watermarks |
9208334, | Oct 25 2013 | Verance Corporation | Content management using multiple abstraction layers |
9224184, | Oct 21 2012 | Digimarc Corporation | Methods and arrangements for identifying objects |
9251549, | Jul 23 2013 | Verance Corporation | Watermark extractor enhancements based on payload ranking |
9262794, | Mar 14 2013 | VOBILE INC | Transactional video marking system |
9317888, | Dec 23 2008 | Digimarc Corporation | Digital watermarking methods, apparatus and systems |
9323902, | Dec 13 2011 | Verance Corporation | Conditional access using embedded watermarks |
9330722, | May 16 1997 | The Trustees of Columbia University in the City of New York | Methods and architecture for indexing and editing compressed video over the world wide web |
9336599, | Jun 23 2010 | Digimarc Corporation | Determining proximity of a mobile device to a subject based on shadow analysis |
9363409, | Mar 05 2001 | DIGIMARC CORPORATION AN OREGON CORPORATION | Image management system and methods using digital watermarks |
9396510, | Sep 01 1999 | Digimarc Corporation | Watermarking different areas of digital images with different intensities |
9412144, | Sep 17 2004 | Digimarc Corporation | Hierarchical watermark detector |
9419951, | Mar 23 2001 | RPX Corporation | System and method for secure three-party communications |
9547753, | Dec 13 2011 | IP ACQUISITIONS, LLC | Coordinated watermarking |
9571606, | Aug 31 2012 | Verance Corporation | Social media viewing system |
9596521, | Mar 13 2014 | Verance Corporation | Interactive content acquisition using embedded codes |
9648282, | Oct 15 2002 | IP ACQUISITIONS, LLC | Media monitoring, management and information system |
9659544, | May 04 2005 | SAMSUNG ELECTRONICS CO , LTD | Luminance suppression power conservation |
9665824, | Dec 22 2008 | The Trustees of Columbia University in the City of New York | Rapid image annotation via brain state decoding and visual pattern mining |
9665919, | Dec 23 2008 | Digimarc Corporation | Digital watermarking methods, apparatus and systems |
9715846, | Jul 16 2003 | Samsung Electronics Co., Ltd. | Background plateau manipulation for display device power conservation |
9785215, | May 04 2005 | SAMSUNG ELECTRONICS CO , LTD | White-based power savings |
9792661, | Apr 24 2001 | Digimarc Corporation | Methods involving maps, imagery, video and steganography |
9794797, | Oct 04 2005 | Multifactorial optimization system and method | |
9818136, | Feb 05 2003 | System and method for determining contingent relevance | |
9898792, | Sep 17 2004 | Digimarc Corporation | Hierarchical watermark detector |
9928560, | Dec 23 2008 | Digimarc Corporation | Signal decoding methods, apparatus and systems |
9953553, | Jul 16 2003 | SAMSUNG ELECTRONICS CO , LTD | Background plateau manipulation for display device power conservation |
RE49334, | Oct 04 2005 | HOFFBERG FAMILY TRUST 2 | Multifactorial optimization system and method |
Patent | Priority | Assignee | Title |
3395024, | |||
4313197, | Apr 09 1980 | Bell Telephone Laboratories, Incorporated | Spread spectrum arrangement for (de)multiplexing speech signals and nonspeech signals |
4425661, | Sep 03 1981 | APPLIED SPECTRUM TECHNOLOGIES, INC | Data under voice communications system |
4495620, | Aug 05 1982 | AT&T Bell Laboratories | Transmitting data on the phase of speech |
4969041, | Sep 23 1988 | Tektronix, Inc | Embedment of data in a video signal |
5010405, | Feb 02 1989 | Massachusetts Institute of Technology | Receiver-compatible enhanced definition television system |
5060262, | May 07 1990 | MICROWAVE FILTER COMPANY, INC | Video scrambling, audio masking and data transmission methods for wireless cable systems |
5285498, | Mar 02 1992 | AT&T IPM Corp | Method and apparatus for coding audio signals based on perceptual model |
5315098, | Dec 27 1990 | Xerox Corporation; XEROX CORPORATION, A CORP OF NY | Methods and means for embedding machine readable digital data in halftone images |
5319735, | Dec 17 1991 | Raytheon BBN Technologies Corp | Embedded signalling |
5325290, | Aug 14 1989 | CENTILLION DATA SYSTEMS, LLC | Billing system with data indexing |
5379345, | Jan 29 1993 | NIELSEN COMPANY US , LLC, THE | Method and apparatus for the processing of encoded data in conjunction with an audio broadcast |
5386240, | Sep 06 1991 | Nippon Television Network Corporation | Encoder/decoder of information upon/from a video signal |
5404377, | Apr 08 1994 | Intel Corporation | Simultaneous transmission of data and audio signals by means of perceptual coding |
5450490, | Mar 31 1994 | THE NIELSEN COMPANY US , LLC | Apparatus and methods for including codes in audio signals and decoding |
5461426, | Aug 20 1993 | SAMSUNG ELECTRONICS CO , LTD | Apparatus for processing modified NTSC television signals, with digital signals buried therewithin |
5465269, | Feb 02 1994 | Motorola Mobility LLC | Method and apparatus for encoding and decoding a supplementary signal |
5465308, | Jun 04 1990 | DATRON ADVANCED TECHNOLOGIES, INC | Pattern recognition system |
5473631, | Apr 08 1924 | Intel Corporation | Simultaneous transmission of data and audio signals by means of perceptual coding |
5515296, | Nov 24 1993 | Intel Corporation | Scan path for encoding and decoding two-dimensional signals |
5530759, | Feb 01 1995 | International Business Machines Corporation | Color correct digital watermarking of images |
5579471, | Nov 09 1992 | GOOGLE LLC | Image query system and method |
5583941, | Oct 20 1993 | Minolta Co., Ltd. | Imaging processor |
5606609, | Sep 19 1994 | SILANIS TECHNOLOGY INC | Electronic document verification system and method |
5613004, | Jun 07 1995 | Wistaria Trading Ltd | Steganographic method and device |
5646997, | Dec 14 1994 | Sony Corporation | Method and apparatus for embedding authentication information within digital data |
5687236, | Jun 07 1995 | Wistaria Trading Ltd | Steganographic method and device |
5710719, | Oct 19 1995 | GOOGLE LLC | Apparatus and method for 2-dimensional data compression |
5710916, | May 24 1994 | Panasonic Corporation of North America | Method and apparatus for similarity matching of handwritten data objects |
5809139, | Sep 13 1996 | Intel Corporation | Watermarking method and apparatus for compressed digital video |
5848155, | Sep 04 1996 | NEC Corporation | Spread spectrum watermark for embedded signalling |
5850481, | Mar 17 1994 | DIGIMARC CORPORATION AN OREGON CORPORATION | Steganographic system |
5859920, | Nov 30 1995 | Intellectual Ventures Fund 83 LLC | Method for embedding digital information in an image |
DE581317A2, | |||
EP635798A1, | |||
EP657831A1, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Aug 27 1997 | Regents of the University of Minnesota | (assignment on the face of the patent) | / | |||
Jun 26 1998 | TEWFIK, AHMED H | MINNESOTA, REGENTS OF THE UNIVERSITY OF | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 009582 | /0211 | |
Jun 26 1998 | SWANSON, MITCHELL D | MINNESOTA, REGENTS OF THE UNIVERSITY OF | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 009582 | /0211 | |
Jun 26 1998 | ZHU, BIN | MINNESOTA, REGENTS OF THE UNIVERSITY OF | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 009582 | /0211 | |
Jul 16 1999 | Regents of the University of Minnesota | AIR FORCE, UNITED STATES OF AMERICA | CONFIRMATORY LICENSE SEE DOCUMENT FOR DETAILS | 010220 | /0025 | |
Oct 17 2001 | COGNICITY, INC | Digimarc Corporation | BID ON COGNICITY ASSETS | 012350 | /0014 | |
Dec 17 2001 | Regents of the University of Minnesota | Digimarc Corporation | EXCLUSIVE LICENSE | 012365 | /0755 | |
Oct 24 2008 | L-1 SECURE CREDENTIALING, INC FORMERLY KNOWN AS DIGIMARC CORPORATION | DIGIMARC CORPORATION FORMERLY DMRC CORPORATION | CONFIRMATION OF TRANSFER OF UNITED STATES PATENT RIGHTS | 021785 | /0796 | |
Apr 30 2010 | DIGIMARC CORPORATION A DELAWARE CORPORATION | DIGIMARC CORPORATION AN OREGON CORPORATION | MERGER SEE DOCUMENT FOR DETAILS | 024369 | /0582 |
Date | Maintenance Fee Events |
Jul 30 2003 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Sep 22 2003 | R2551: Refund - Payment of Maintenance Fee, 4th Yr, Small Entity. |
Sep 22 2003 | STOL: Pat Hldr no Longer Claims Small Ent Stat |
Jun 21 2006 | ASPN: Payor Number Assigned. |
Jun 21 2007 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jul 21 2011 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Mar 01 2003 | 4 years fee payment window open |
Aug 29 2003 | 6 months grace period start (w surcharge) |
Feb 29 2004 | patent expiry (for year 4) |
Mar 01 2006 | 2 years to revive unintentionally abandoned end. (for year 4) |
Mar 01 2007 | 8 years fee payment window open |
Aug 29 2007 | 6 months grace period start (w surcharge) |
Feb 29 2008 | patent expiry (for year 8) |
Mar 01 2010 | 2 years to revive unintentionally abandoned end. (for year 8) |
Mar 01 2011 | 12 years fee payment window open |
Aug 29 2011 | 6 months grace period start (w surcharge) |
Feb 29 2012 | patent expiry (for year 12) |
Mar 01 2014 | 2 years to revive unintentionally abandoned end. (for year 12) |